WikiLeaks reveals vast CIA spying, cyberwar operation

The bitter internecine struggle within the US state apparatus and ruling political establishment, featuring unsubstantiated Democratic claims of Russian hacking in support of Trump, on the one hand, and Trump’s own charge that his campaign was bugged by Obama, on the other, was overshadowed Tuesday by a massive release of CIA documents by WikiLeaks.[/su_panel]

The 8,761 documents contained in what WikiLeaks has described as “the largest intelligence publication in history” have begun to lay bare a vast system of surveillance, hacking and cyberwarfare directed against the people of the United States and the entire planet.

The anti-secrecy organization called the first document trove “Year Zero” and said that further CIA data dumps are still to come under a larger project dubbed “Vault 7.”

The files were taken from the CIA’s Center for Cyber Intelligence, a huge and little-known command that includes some 5,000 hackers, both CIA agents and private contractors. Much as in the case of Edward Snowden’s leaking of secret documents exposing the global spying operation of the National Security Agency (NSA) in 2013, the CIA documents have apparently come from a former agency hacker or contractor concerned about the scope and purpose of the agency’s cyberwar operations.

The programs described in the documents indicate that the CIA, according to WikiLeaks, has developed “more than a thousand hacking systems, trojans, viruses and other ‘weaponized’ malware” allowing it to seize control of devices, including Apple iPhones, Google’s Android operating system (used by 85 percent of smart phones) and devices running Microsoft Windows. By hacking these devices, the CIA is also able to intercept information before it is encrypted on social media platforms such as WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman.

The agency has apparently stockpiled so-called weaponized “zero-day” threats that can be used to exploit unidentified vulnerabilities in a wide range of devices before their manufacturer is able to detect the flaw and correct it. Under the Obama administration, the White House had supposedly established a “Vulnerabilities Equities Process,” under which the intelligence agencies would inform manufacturers of most software vulnerabilities while keeping some to itself for exploitation. In part, this was designed to prevent US companies from losing market share overseas. The vast character of the CIA arsenal establishes that this program was a sham from the outset.

One of the programs developed by the CIA, codenamed “Weeping Angel,” turns Samsung smart televisions into the kind of technology envisioned by George Orwell in 1984, in which “thought police” monitored “telescreens” that served as both televisions, broadcasting the speeches of “Big Brother,” and security cameras, monitoring every word and action of the viewer. This surveillance technique places targeted TVs in a “fake off” mode, transmitting conversations in a room over the Internet to a covert CIA server.

WikiLeaks reported that a large amount of information had been redacted from the leaked documents, including computer codes for actual cyberweapons as well as the identities of “tens of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

The “deep state” in the US is more massive and powerful than anywhere in the world and is the patron of similar military-intelligence complexes in countries like Egypt, Turkey and Pakistan. As for “legal and moral norms,” the latest revelations about the CIA, an organization long ago dubbed Murder, Inc., offer a glimpse of the real methods of the American state.

That “targets” exist in the US indicates that the agency is engaged in wholesale domestic spying in violation of its charter.

The documents also establish that the CIA has developed these programs in collaboration with MI5, the British intelligence agency, and that it operates a covert cyberwarfare center out of the US Consulate in Frankfurt, Germany.

One chilling revelation provided by the documents, according to WikiLeaks, is that, “As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.” WikiLeaks notes that “The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Hastings: Really an accidental death or dirty pool?

While WikiLeaks does not specifically mention it, this was the scenario suggested by many in the 2013 fatal single-car accident in Los Angeles that claimed the life of journalist Michael Hastings. At the time of his death, Hastings, who had previously written an article that led to the removal of Gen. Stanley McChrystal as the top US commander in Afghanistan, was working on a profile of Obama’s CIA director John Brennan. Before the accident, Hastings had informed colleagues that he was under government surveillance and had asked a neighbor to lend him her car, saying he feared his own vehicle had been tampered with.

One other politically significant element of the revelations contained in the WikiLeaks documents concerns a CIA program known as “Umbrage,” which consists of a sizable “library” of malware and cyberattack techniques developed in other countries, including Russia. The agency is able to exploit these “stolen” tools to mask its own attacks and misdirect attribution to their originators. The existence of such a program underscores the lack of any foundation for the hysterical campaign alleging Russia’s responsibility for the hacking and leaking of Democratic Party emails.

While the Democrats continue to center their fire against Trump on the question of alleged ties to Russia—rather than the reactionary policies his administration has unleashed against immigrants and the working class as a whole—the WikiLeaks revelations about the CIA are being dismissed by sections of the media as another Moscow plot.

Along similar lines, the New York Times Monday published a lengthy article mocking alleged “signs of a White House preoccupation with a ‘deep state’ working to thwart the Trump presidency” following Trump’s charge that he had been bugged during the presidential campaign.

Such a term might be appropriate for countries like Egypt, Turkey or Pakistan, the Times argued, but could not be applied to the US because it “suggests an undemocratic nation where legal and moral norms are ignored.”

The reality is that the “deep state” in the US is more massive and powerful than anywhere in the world and is the patron of similar military-intelligence complexes in countries like Egypt, Turkey and Pakistan. As for “legal and moral norms,” the latest revelations about the CIA, an organization long ago dubbed Murder, Inc., offer a glimpse of the real methods of the American state.

That the Times attempts to dismiss concerns about the activities and influence of the military-intelligence apparatus only establishes its own role as a propaganda organ and ideological instrument of this “deep state,” with the most intimate ties to the CIA, the Pentagon and other agencies.

The documents released by WikiLeaks cover the period of 2013 to 2016, the last years of the Obama administration, which presided over the continuation and spread of the wars begun under Bush, a sweeping expansion of the power the US intelligence apparatus and a corresponding assault on democratic rights. This included the organization of an international drone assassination program under which the White House claimed the authority to order the extrajudicial murder of American citizens.

This vast apparatus of war, repression and mass surveillance has now been handed over to the administration of Donald Trump, a government of billionaires, generals and outright fascists that is determined to escalate war abroad and carry out unprecedented attacks on the working class at home.

While the Democratic Party is calling for a special prosecutor over alleged Russian “meddling” in the US election—a demand aimed at sustaining the US war drive against Russia and diverting the mass opposition to Trump into reactionary channels—and Trump is calling for a probe of the alleged bugging of his communications, neither side has called for investigation of the CIA spying operation. Both Democrats and Republicans are agreed that such police-state measures are required to defend the crisis-ridden capitalist system against the threat of a social revolution by the working class.

—Bill Van Auken

Note to CommentersDue to severe hacking attacks in the recent past that brought our site down for up to 11 days with considerable loss of circulation, we exercise extreme caution in the comments we publish, as the comment box has been one of the main arteries to inject malicious code. Because of that comments may not appear immediately, but rest assured that if you are a legitimate commenter your opinion will be published within 24 hours. If your comment fails to appear, and you wish to reach us directly, send us a mail at: editor@greanvillepost.com

We apologize for this inconvenience.

If you appreciate our articles, do the right thing and let us know by subscribing. It’s free and it implies no obligation to you—ever. We just want to have a way to reach our most loyal readers on important occasions when their input is necessary. In return you get our email newsletter compiling the best of The Greanville Post several times a week.

Fake! Fake! The Fake News Hysteria

Journalism That Matters

"When you don’t see what is right and what is true, you are free to follow your little egotistical interests. You can chase after money and women and glory. But when you do see the right thing, you must either fight for it or go to pieces. If you don’t see the truth you are merely blind. But if you see it and do not support it, you become corrupt.” —Joseph Freeman, An American Testament

Oliver Stone: The Media is the Enemy

“Our citizens should know the urgent facts...but they don’t because our media serves imperial, not popular interests. They lie, deceive, connive and suppress what everyone needs to know, substituting managed news misinformation and rubbish for hard truths..."—Oliver Stone

What is 30 cents a day for vital information?

ALL ABOUT US

GOT SOMETHING TO TELL US?

TGP is part of The Voice of Nature Network

Truth, for a change.

“Military men are just dumb, stupid animals to be used as pawns in foreign policy.”

This is what the plutocracy that Kissinger serves really thinks of the military. All that praise and worshipping on the media is just a thick curtain of hypocrisy to maintain morale among the deceived imperial troopers.

Become part of history—a new movement is aborning

A literary accomplishment.

Have YOU read Texac’s chronicles of the war in the Donbass? AN EYEWITNESS ACCOUNTIf not, you’re really missing something.Just click on the image above.

READ OUR DISCLAIMER

DISCLAIMER

Disclaimer: The contents of articles published on The Greanville Post are of sole responsibility of the author(s). The Greanville Post, a publication of The Voice of Nature Network, Inc., (VNN), a not-for-profit 501 (c) (3) corporation, will not be responsible for any inaccurate or incorrect statement in this article. The Greanville Post grants permission to cross-post original The Greanville Post articles on community internet sites as long as the text & title are not modified. The source and the author's copyright must be displayed. For publication of The Greanville Post articles in print or other forms including commercial internet sites, contact: greanville@gmail.com

THE GREANVILLE POST contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of "fair use" in an effort to advance a better understanding of political, economic and social issues, and the furtherance of peace and social justice, the defence of our planetary ecosystems, and the prevention and eventual elimination of human abuse, exploitation,.and cruelty toward any and all non-human species The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than "fair use" you must request permission from the copyright owner.